cyphunk / sbdl
Secure Boot Definition Languag
☆10Updated 2 years ago
Alternatives and similar repositories for sbdl:
Users that are interested in sbdl are comparing it to the libraries listed below
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- A library & tool for probing, parsing, and validating security.txt files as specified in RFC 9116☆14Updated 2 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆15Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Binary and Static Releases☆14Updated 3 weeks ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- The official command line client for IPFinder☆11Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Extract TLS metadata from connection in JSON format.☆16Updated 4 years ago
- ☆18Updated 3 years ago
- ☆22Updated 9 months ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 4 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- the puppy proxy☆22Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- ☆14Updated 3 years ago
- ☆16Updated 4 years ago
- ☆19Updated 7 years ago